Abstract
Embedded applications such as voice encryption in wireless telephones can place severe constraints on the amount of processing power, program space and memory available for software encryption algorithms. Additionally, some protocols require some form of two-level keying which must be reasonably fast. This paper introduces a mechanism for creating a family of stream ciphers based on Linear Feedback Shift Registers over the Galois Finite Field of order 2n, where n is chosen to be convenient for software implementation. A particular stream cipher based on this methodology, SOBER, is presented and analysed.
Preview
Unable to display preview. Download preview PDF.
References
See Ross Anderson's posting on USENET newsgroup sci.crypt, “Subject: A5 (Was: HACKING DIGITAL PHONES)”, 17 Jun 1994,. Alternatively, S. B. Xu, D. K. He, and X. M. Wang, “An implementation of the GSM General Data Encryption Algorithm A5”, CHINACRYPT '94, Xidian, China, 11–15 November 1994, pp 287–291 (in Chinese). The latter appears to be based on the same information as Anderson's posting (or possibly the posting itself) as Anderson states that two of the registers have unknown polynomials, but the polynomials are the same in his posting and Xu et.al.
W. Caelli, E Dawson, L. Nielsen, H. Gustafson, “CRYPT-X Stastical Package Manual, Measuring the strength of Stream and Block Ciphers”, Queensland Univeristy of Technology, 1992, ISBN 0-86856-8090.
T. Herlestam, “On functions of Linear Shift Register Sequences”, in Franz Pichler, editor, Proc. EUROCRYPT 85, LNCS 219, Springer-Verlag 1986.
G. Marsaglia, “DIEHARD”, http://stat.fsu.edu/~geo/diehard.html
A. Menezes, P. Van Oorschot, S. Vanstone, “Handbook of Applied Cryptography”, CRC Press, 1997, Ch 6.
C. Paar, Ph.D. Thesis, “Efficient VLSI Architectures for Bit-Parallel Computation in Galois Fields”, Institute for Experimental Mathematics, University of Essen, 1994, ISBN 3-18-332810-0.
B. Schneier, “Applied Cryptography Second Edition”, Wiley 1996, pp. 369–413.
TIA/EIA Standard IS-54B, Telecommunications Industry Association, Vienna VA., USA.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Rose, G. (1998). A stream cipher based on linear feedback over GF(28). In: Boyd, C., Dawson, E. (eds) Information Security and Privacy. ACISP 1998. Lecture Notes in Computer Science, vol 1438. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0053728
Download citation
DOI: https://doi.org/10.1007/BFb0053728
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-64732-4
Online ISBN: 978-3-540-69101-3
eBook Packages: Springer Book Archive